In the new issue of Regulation, economist Pierre Lemieux argues that the recent oil price decline is at least partly the result of increased supply from the extraction of shale oil. The increased supply allows the economy to produce more goods, which benefits some people, if not all of them. Thus, contrary to some commentary in the press, cheaper oil prices cannot harm the economy as a whole.

Two long wars, chronic deficits, the financial crisis, the costly drug war, the growth of executive power under Presidents Bush and Obama, and the revelations about NSA abuses, have given rise to a growing libertarian movement in our country – with a greater focus on individual liberty and less government power. David Boaz’s newly released The Libertarian Mind is a comprehensive guide to the history, philosophy, and growth of the libertarian movement, with incisive analyses of today’s most pressing issues and policies.

Search form

Tag: intelligence community

The New York Times dutifully reports that the Director of National Intelligence says it is. But it’s hard to know what that means. The word “cyberattack” has no usefully fixed definition.

And the important questions—plural—include: 1) whether cyberattacks—plural—are growing in number and sophistication more quickly than the capability of infrastructure owners to fend them off and recover from them; 2) which, if any, owners lack incentives to secure their infrastructure and what security externalities they might create; and 3) what levers—such as contract liability, tort liability, or regulation—might correct any such market failures.

Terrorist groups and their sympathizers have expressed interest in using cyber means to target the United States and its citizens.

to this:

The cyber criminal sector in particular has displayed remarkable technical innovation with an agility presently exceeding the response capability of network defenders.

Now, which class of actors are you going to worry about—the ones that dream of doing something bad? Or the ones that have the sophistication to do something bad? Probably the latter.

While calling for a federal intelligence-community role in “cybersecurity,” Blair confesses that this is more of a crime problem that the business sector needs to handle than a true national security issue in which the leading role would be played by government.

The good news is that crime syndicates don’t prosper by killing their hosts. Don’t look for catastrophic failure of our technical infrastructures arising from this most serious of “cyber” threats.

There’s no question that cybersecurity is important. But it’s also manageable. I shared my thoughts on “cybersecurity” last year with the House Science Committee.

This is a reminder, citizen: Only cranks worry about vastly increased governmental power to gather transactional data about Americans’ online behavior. Why, just last week, Rep. Lamar Smith (R-TX) informed us that there has not been any “demonstrated or recent abuse” of such authority by means of National Security Letters, which permit the FBI to obtain many telecommunications records without court order. I mean, the last Inspector General report finding widespread and systemic abuse of those came out, like, over a year ago! And as defenders of expanded NSL powers often remind us, similar records can often be obtained by grand jury subpoena.

The sweeping request came with a gag order prohibiting Clair from talking about it. (As a constitutional matter, courts have found that recipients of such orders must at least be allowed to discuss them with attorneys in order to seek advise about their legality, but the subpoena contained no notice of that fact.) Justice Department officials tell McCullagh that the request was never reviewed directly by the Attorney General, as is normally required when information is sought from a press organization. Clair did tell attorneys at the Electronic Frontier Foundation, and when they wrote to U.S. Attorney Timothy Morrison questioning the propriety of the request, it was promptly withdrawn. EFF’s Kevin Bankston explains the legal problems with the subpoena at length.

Perhaps ironically, the targeting of Indymedia, which is about as far left as news sites get, may finally hep the populist right to the perils of the burgeoning surveillance state. It seems to have piqued Glenn Beck’s interest, and McCullagh went on Lou Dobbs’ show to talk about the story. Thus far, the approved conservative position appears to have been that Barack Obama is some kind of ruthless Stalinist with a secret plan to turn the United States into a massive gulag—but under no circumstances should there be any additional checks on his administration’s domestic spying powers. This always struck me as both incoherent and a tragic waste of paranoia. Now that we’ve had a rather public reminder that such powers can be used to compile databases of people with politically unorthodox browsing habits, perhaps Beck—who seems to be something of an amateur historian—will take some time to delve into the story of COINTELPRO and other related projects our intelligence community busied itself with before we established an architecture of surveillance oversight in the late ’70s.

In a post on Saturday at NRO’s the Corner blog, former Bush speech writer Marc Theissen exhibits ignorance of basic security concepts too galling to let pass without comment.

Attempting to refute the idea that hijacking planes and flying them into buildings was “off the table” as a terrorist tactic after 9/11, Theissen says:

Really? Planes were off the table after 9/11? That would come as a surprise to every passenger in the past three years who had their liquids confiscated in an airport security line. Those security measures were instituted because in 2006 we foiled an al-Qaeda plot to hijack airplanes leaving London’s Heathrow airport and blow them up over the Atlantic (a plot our intelligence community says was just weeks from execution).

(First, put aside some issues - “what the government says about its security measures must be true” and both the immediacy and viability of the liquid bomb plot in London.)

The difference between “hijacking” and “bombing” shouldn’t need explaining. The former is taking over the controls of a thing, enabling an attacker to direct it into other things. The latter is exploding something in it or on it so as to render it inoperable.

Americans ritually donate their toothpaste to sanitation departments in the cities they visit not because a liquid bomb could enable the commandeering of a plane, but because the alleged liquid bomb could take a plane out of the sky.

The bombing of a plane is a serious concern, but not as serious or potentially damaging as the commandeering of an aircraft. And commandeering is essentially off the table. The hardening of cockpit doors, new procedures at the fronts of planes, and newfound resolve of passengers and crews against commandeering have reduced the likelihood of future commandeerings to near zero. That was what the plane going down in Pennsylvania was all about.

If it weren’t made in debate about such serious issues, Theissen’s error would be quite comical. In his jumbled version of events, the liquid bomb plotters were going to go to the trouble of capturing the controls of an airplane, then fly it around for a while, and finally blow it up over the Atlantic. It’s reminiscent of the Seinfeld episode in which Elaine attacks the theory that an elderly couple running a nearby cobbler shop had shut it down just to abscond with Jerry’s shoes:

ELAINE (amused): So. Mom and Pop’s plan was to move into the neighborhood…establish trust…for 48 years. And then, run off with Jerry’s sneakers.